Passport control for foreign integrated DNAs

نویسندگان

  • Ilaria Palmisano
  • Giulia Della Chiara
  • Maria Vittoria Schiaffino
  • Guido Poli
چکیده

The endless battle between mammalian host cells and microbes has evolved mechanisms to shut down the expression of exogenous transcriptional units integrated into the genome with the goal of limiting their spreading. Recently, we observed that deprivation of essential amino acids leads to a selective, reversible upregulation of expression of exogenous transgenes, either carried by integrated plasmids or retroviral vectors, but not of their endogenous counterparts. This effect was dependent on epigenetic modifications and was mediated by the downregulation of the class II histone deacetylase-4 (HDAC4). Indeed, HDAC4 expression inversely correlated with that of the transgene and its inhibition or downregulation enhanced transgene expression. Could this be true also for "naturally" integrated proviruses? We investigated this question in the case of HIV-1, the etiological agent of AIDS and we observed that both amino acid starvation and HDAC4 inhibition triggered HIV-1 reactivation in chronically infected ACH-2 T lymphocytic cells (HDAC4+), but not in similarly infected U1 promonocytic cells (HDAC4-negative). Thus, an HDAC4-dependent pathway may contribute to unleash virus expression by latently infected cells, which represent nowadays a major obstacle to HIV eradication. We discuss here the implications and open questions of these novel findings, as well as their serendipitous prelude.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Passport/Visa: Authentication and Authorisation Tokens for Ubiquitous Wireless Communications

Ubiquitous connectivity faces interoperation issues between wireless network providers when authenticating visiting users. This challenge lies in the fact that a foreign network provider does not initially have the authentication credentials of the mobile users. The existing approaches are based on roaming agreement to exchange authentication information between the home network and a foreign n...

متن کامل

Security Analysis of Australian and E.U. E-passport Implementation

This paper makes a formal security analysis of the current Australian e-passport implementation using model checking tools CASPER/CSP/FDR. We highlight security issues in the current implementation and identify new threats when an e-passport system is integrated with an automated processing system like SmartGate. The paper also provides a security analysis of the European Union (EU) proposal fo...

متن کامل

A biometric based secure session key agreement using modified elliptic curve cryptography

Protection of data and network security has been greatly researched. To enhance the security in the case of border control applications like E-Passport, conventional cryptographic concepts are integrated with biometrics. To avoid the intrusion of terrorists after the terrorists attack of 9/11, many countries begin to issue E-Passport to their citizens contains biometric data like face, fingerpr...

متن کامل

The Effect of Integrated and Independent Tasks on English Foreign Language learners' writing ability

This study aimed at investigating the difference of integrated writing task of the TOFEL iBT candidates in comparison with independent writing task on Iranian EFL learners writing performance. The initial population for the study was 50 junior EFL students. To get more homogeneity, participants were selected among those who were studying in the third year of university in EFL major. They were m...

متن کامل

ePassport: Securing International Contacts with Contactless Chips

Electronic passports (ePassports) have known a wide and fast deployment all around the world since the International Civil Aviation Organization published their specifications in 2004. Based on an integrated circuit, ePassports are significantly more secure than their predecessors. Forging an ePassport is definitely thwarted by the use of cryptographic means. In spite of their undeniable benefi...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره 2  شماره 

صفحات  -

تاریخ انتشار 2012